Authentication & authorization News
March 17, 2017
Although minting authentication cookies is not widely understood, the Yahoo hacker indictments has brought it to the forefront and shown it can be very dangerous.
February 23, 2017
Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.
January 27, 2017
In part two of his interview with SearchSecurity, SSH creator Tatu Ylonen explains why proper SSH key management is crucial and how attackers can use lost or exposed keys.
December 12, 2016
Executives from One Identity, which operates under Quest Software, discuss the company's renewed focus on the channel.
Authentication & authorization Get Started
Bring yourself up to speed with our introductory content
Securing enterprise systems and information requires an IAM roadmap that helps you identify effective policy, technology and tools. Continue Reading
The new vSphere REST API comes with a number of advanced capabilities that simplify automation and management. Here are a few ways to best use its capabilities. Continue Reading
An identity and access management system is increasingly essential to corporate security, but technological advances have made managing an IAM more complex than ever. Continue Reading
Evaluate Authentication & authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
IAM technology helps protect unstructured content by facilitating access for the right identities and content processes and procedures within the enterprise. Continue Reading
Security is critical in the cloud, so it isn't surprising that identity and access management services are in high demand. Learn why you need IAM, and what services to consider. Continue Reading
Identity governance and access management systems overlap naturally, but they are still distinct. Expert Matthew Pascucci explains the difference between these two aspects of IAM. Continue Reading
Manage Authentication & authorization
Learn to apply best practices and optimize your operations.
More likely than not, your company's identity and access management strategy needs an update. Learn how to decide if that's the case and, if so, what you should do now. Continue Reading
With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware. Continue Reading
Containers have many benefits for application development, including higher performance in a smaller footprint. But a few hurdles stand in the way of seamless container portability. Continue Reading
Problem Solve Authentication & authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The FBI's cyber division notified the private industry that cyber criminals are targeting File Transfer Protocol (FTP) servers in order to get their hands on protected health information (PHI). ... Continue Reading
A holistic risk management approach allows you to develop and deploy a critical, hyper-connected IoT infrastructure without compromising security. Continue Reading
After enterprise identities are authenticated, an authorization management system should monitor how resources are being used. Expert Peter Sullivan explains how it can work. Continue Reading